Explaining the GitHub DDoS Attack

Поделиться
HTML-код
  • Опубликовано: 6 сен 2024
  • John outlines the details of the DDoS attack that targeted the popular GitHub website. It was the largest DDoS attack ever in recorded history. The attackers used a known vulnerability of memcached servers to launch an amplification attack at GitHub. The attack lasted about 20 minutes, but GitHub successfully defended it. The attack vector used by the attackers still exists today, so the attack could be launched again with relative ease. Be sure to watch the video to learn about the attack and how to defend against it.
    More info here on DevCentral: community.f5.c...

Комментарии • 50

  • @rakesh2639
    @rakesh2639 4 года назад +5

    The way of explaining is really good, thanks John to published the knowledgeable article.

    • @devcentral
      @devcentral  4 года назад

      glad you enjoyed it!

    • @deaconfelix7539
      @deaconfelix7539 3 года назад

      Sorry to be off topic but does someone know a tool to log back into an instagram account?
      I stupidly lost the account password. I would appreciate any tips you can offer me.

  • @ytbcmt4686
    @ytbcmt4686 6 лет назад +7

    BTW, Akamai was the company which fended off the largest DDoS attack in history!

    • @winzony
      @winzony 6 лет назад +3

      Nop Arbor networks 1.7 Tbps

  • @samlaf92
    @samlaf92 Год назад +2

    Is a scrubbing center just a "large pipe" that can handle the temporary traffic spike?

    • @devcentral
      @devcentral  Год назад

      pretty much but you also need the intelligence/software/etc to be able to pick out the bad stuff and let through the good.

  • @kieranriordan1908
    @kieranriordan1908 7 месяцев назад

    great video, broke it down well for a beginner to understand, thank you!

  • @sak2029
    @sak2029 6 лет назад +1

    Short and crisp.. Very informative..

  • @vengalachandu4080
    @vengalachandu4080 3 года назад +1

    Superb ..thanks john

  • @tdibandara3478
    @tdibandara3478 4 года назад +2

    Very clear and informative, thank you

  • @saqibmehmood1223
    @saqibmehmood1223 3 года назад +2

    Very Informative video!

  • @digitzero3613
    @digitzero3613 6 лет назад +25

    Instructions were not clear, I forgot to spoof my IP

    • @dashdashdash_
      @dashdashdash_ 4 года назад

      I actually use the ping function i find it very handy the other day i knocked of the government because they r bad ppl and then i didded a game serverice so let me know in the comments if this tutorial helped you.

  • @rakesh2639
    @rakesh2639 5 лет назад +2

    Good explanation, ultimate knowledgeable person, thank a lots for sharing video

  • @carolinemathieson
    @carolinemathieson 6 лет назад +12

    John, can you write backwards or am I seeing a mirror image of you?

    • @devcentral
      @devcentral  6 лет назад +11

      Hi Caroline...great question! We flip the image after recording, so it's a mirror image. I wish I could write backwards that well, though!

    • @0ttt3R
      @0ttt3R 6 лет назад +1

      I had to re-watch the first 5 mins of the video because I was trying to figure this out - you'll notice he appears to be writing from right to left in the video ;)

    • @jackoe1246
      @jackoe1246 6 лет назад +2

      Such a simple tool gives such a great solution! Cool video!

    • @s2korpionic
      @s2korpionic 4 года назад +2

      @@devcentral Wait... so that Dev Central logo is also backwards?

    • @larrymckeithan7308
      @larrymckeithan7308 4 года назад +2

      @@devcentral How do you keep the logo on your shirt from being flipped as well?

  • @EdeYOlorDSZs
    @EdeYOlorDSZs 2 года назад +1

    very clear, thanks!

    • @devcentral
      @devcentral  2 года назад

      Glad you enjoyed it and we appreciate the comment!

  • @munhumutapa1330
    @munhumutapa1330 5 лет назад +1

    Great illustration, thank you.

  • @deadchannel3
    @deadchannel3 2 года назад

    Memcrashed, very powerful, but after testing the severs, the amplification factor isn’t to great. Even if some one is getting attacked they can flush all memcrashed servers stopping the attack. Note: NTP amplification has a amp factor of more than 2000 with a good server.

  • @stunnacid
    @stunnacid 6 лет назад +5

    Great video keep it up!

  • @epicisdan
    @epicisdan 6 лет назад +2

    Clear and informative video. Subscribed

    • @devcentral
      @devcentral  6 лет назад

      thanks...glad you enjoyed it!

  • @sebon11
    @sebon11 4 года назад +1

    Great explanation, thank you. There are few things that I totally can't understand, like how can someone from outside change the server limit. Can you do that by knowing ip address of some memcached server? It's THAT easy? I don't think so. I just don't get it, there must be some system that allows only administrators to do it. But that's just little unclear part, generally this explanation was great, thx alot!

    • @devcentral
      @devcentral  4 года назад +3

      Great question Sebastian...and sorry for the very late response on this. I briefly mentioned that someone could change the memory limit on the memcached server, but it's true that changing the configuration of the memcached server would require that someone has gained access to that server (hacked it). So, while open memcached servers are easy targets for launching DDoS attacks, the specific part about changing the configuration of the memory size limits is a bit more involved. You would need to modify the /etc/sysconfig/memcached file to change the CACHESIZE limit. Here's an example of that file:
      # vi /etc/sysconfig/memcached
      PORT="11211"
      USER="memcached"
      # max connection 2048
      MAXCONN="2048"
      # set ram size to 4096
      CACHESIZE="4096"
      # optional config: i.e. disable UDP and listen to loopback ip 127.0.0.1, for network connection use real ip e.g., 10.0.0.5
      OPTIONS="-U 0 -l 127.0.0.1"

  • @nmestre2
    @nmestre2 2 года назад +1

    Thank you :)

  • @simonjohn8374
    @simonjohn8374 6 лет назад +2

    Amazing explanantion

  • @spicace
    @spicace 3 года назад

    Why accept UDP into the DMZ ?

  • @sylvesterobioha1030
    @sylvesterobioha1030 4 года назад +1

    Simplicity played out! weldone!

  • @web2yt488
    @web2yt488 6 лет назад +3

    Playback speed 1.5x

  • @corbenreed6724
    @corbenreed6724 Год назад

    Thanks Peyton Manning!